From Fedora Project Wiki

  • ...running in India Region. It is based on Cyber Security, Cyber Awareness & Cyber Crime solutions
    149 bytes (23 words) - 15:52, 10 June 2022
  • == Cyber world uk == == [[http://www.fedoraproject.org/wiki/User:Cyberworldukltd Cyber world uk]] ==
    1,008 bytes (127 words) - 09:30, 22 June 2012
  • '''Interested in cyber security and everything related to it.'''
    64 bytes (10 words) - 21:18, 4 October 2022
  • File:YanNaingMyint.png
    ...out "Permissions in Linux" featuring "SELinux" and "Fedora" at 4th Myanmar Cyber Conference which was held on July 5, 2015.
    (695 × 595 (250 KB)) - 08:17, 7 July 2015
  • * Security hardening Fedora for Cyber Cafes. * Fedora image creator for two Cyber Cafes located in Mathare Valley, Nairobi, Africa [http://web.me.com/eauyong
    2 KB (306 words) - 02:19, 1 November 2009
  • *B.S. in IT w/ minors in cyber security and data management and analysis (2015 expected).
    372 bytes (55 words) - 04:31, 20 August 2013
  • * Diploma in Cyber Law, from, Govt. Law College.
    504 bytes (75 words) - 07:25, 25 May 2012
  • * Diploma in Cyber Law, from, Govt. Law College.
    504 bytes (75 words) - 07:25, 25 May 2012
  • ...ora user from Southern Oregon, and currently pursuing a master's degree in Cyber Security. I can be frequently found on freenode under the name rainfall, o
    397 bytes (77 words) - 23:52, 5 November 2012
  • CEO | Cyboz Cyber Consortium
    580 bytes (72 words) - 19:41, 6 July 2012
  • Myself Amarnath Jayaraman.My education qualification is Master of Science in Cyber Technology . Apart from my Post Graduation I have completed professional ce | Educational Qualification||M.S Cyber Technology
    2 KB (310 words) - 11:24, 6 November 2009
  • Cyber Security,
    444 bytes (56 words) - 13:35, 10 July 2016
  • ...y in malware techniques. I have distributed lectures on advanced topics of cyber security at various location in India as well as overseas locations.
    2 KB (249 words) - 12:50, 3 July 2015
  • ...lists, working with open-sourced tools to work with investigators to bring cyber criminals to justice.
    627 bytes (84 words) - 01:56, 22 March 2013
  • * [[http://www.cyber-anthro.com Cyber Anthropologist]] ** [[http://www.cyber-anthro.com/?p=179#content Working on my practicum (thesis) concerning the F
    856 bytes (114 words) - 04:36, 24 November 2009
  • ...erm "[https://blog.jasoncallaway.com/2016/10/27/origins-of-the-term-cyber/ cyber]" cool again.
    976 bytes (126 words) - 15:16, 29 June 2018
  • * Cyber-Security.
    1 KB (147 words) - 21:10, 11 July 2011
  • * I am currently head of offensive security for cyber security firm Bridewell Consulting here I lead a team of ethical hackers an
    823 bytes (117 words) - 09:43, 3 March 2024
  • ...of personal experience in Virtualization, 1 year of personal experience in cyber-security.
    831 bytes (108 words) - 11:20, 22 August 2022
  • === Defining the term "cyber" === The term "cyber" itself is somewhat overloaded.
    10 KB (1,515 words) - 14:41, 18 March 2021
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)